Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

internet of things laptop

Gartner: Risk, relentless data center demand, open source and other tech trends IT needs to know

There are a number of key themes echoing around the Symposium this week many having to do the smart algorithms and how that kind of technology is going to change the world forever. Another is the move to an all-digital world – a...

john mcafee

McAfee plans to be elected president in a landslide on the backs of 40 million tatooed voters

In an interview with CSO contributors Ira Winkler and Araceli Treu Gomes, the cybersecurity guru discusses why he wants someone literate in technology to run the country.

ipad security

Apple’s new two-factor authentication bumps up security and ease of use

Apple is slowly rolling out a revised system to let you use a second factor with iCloud and other services that use an Apple ID.

salesperson vendor pitches

Right back at you tech vendors: OUR independent study of YOUR independent research

While not as useless as PR pitches about technology companies cracking some other publication's Top 10 list, "independent" research reports commissioned by vendors are right up there.

10 cool things about ISE 2.0

Now that Cisco has Finally Released the Identity Service Engine 2.0 (ISE) it seems only appropriate to call out some of the BEST things about it.


Digital Guardian buys Code Green to gain data-loss prevention tech

Endpoint security vendor Digital Guardian has bought Code Green Networks, which makes data loss prevention appliances for businesses.

phishing cyber theft hacked scam

Cisco disrupts $60M ransomware biz

Finds Angler servers at a Dallas hosting provider during research


Gartner: Top 10 strategic predictions that could shake up IT

The robots decidedly have it. They will help run businesses, make decisions for you and maybe even be your boss. Those were just some of the predictions put forth by Gartner vice president Daryl Plummer at the consultancy’s always...

p6 man drawing cloud security

When it comes to security, trust but verify

If you want to help employees do their best work, and appeal to Millennials both in and outside of IT, corporate assets should be fully available unless there's a good reason to limit access.


Snowden talks about secret smartphone spying Smurfs, coming home to go to prison

Edward Snowden told the BBC about the GCHQ's use of "Smurfs" for secret smartphone spying, and discussed his willingness to go to prison so he could come home.

U.S. Critical Infrastructure Continue to Make Risky IT Bets

More than half of critical infrastructure organizations admit that they have insecure IT products and services deployed on their networks.

counter threats with a human machine dual strategy

Counter cybersecurity threats with a human-machine dual strategy

Earlier this year, the 3.5-hour outage at the New York Stock Exchange (NYSE) raised a lot of eyebrows in the IT community. While official statements claim "technical issues" following a software update, human error still played a...

How to chat up Department of Homeland Security about DDoS attacks

The Department of Homeland Security's Science & Technology Directorate later this month will hold an hour-long Twitter chat to discuss the United States' plan to protect its networks against distributed denial-of-service attacks.

mobile smartphone hands user

Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

Android Marshmallow and iOS 9 add new tricks to the MDM arsenal, especially for app management

15 10cwdsecurity

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor? It’s a tricky balancing act that trips up many organizations.

Court of Justice of the European Union

Doom or delight? Court ruling on Safe Harbor brings uncertainty to privacy dealings

The Safe Harbor agreement protected businesses exporting personal data from the EU to the US -- but a court ruling has declared it invalid, opening a legal void.

IP camera makers pressure researcher to cancel security talk

An upcoming talk covering security problems in Internet-connected cameras has been canceled after opposition from some manufacturers.

150817 google marshmallow 07

Google patches second round of Stagefright flaws in Android

Google has issued patches for two new Stagefright-related software vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk.

Gartner: IT should simplify security to fight inescapable hackers

The Risk and Security officer in many enterprises today is mostly concerned with old technology risks. They’ve become obsessed with external hacks, chasing the impossible goal of perfect protection. However, 65% of CEOs say their risk...

Load More